Sciweavers

17 search results - page 4 / 4
» Computational Secrecy by Typing for the Pi Calculus
Sort
View
FOSSACS
2005
Springer
13 years 10 months ago
Mathematical Models of Computational and Combinatorial Structures
The general aim of this talk is to advocate a combinatorial perspective, together with its methods, in the investigation and study of models of computation structures. This, of cou...
Marcelo P. Fiore
TGC
2007
Springer
13 years 11 months ago
Access Control Based on Code Identity for Open Distributed Systems
In computing systems, trust is an expectation on the dynamic behavior of an agent; static analysis is a collection of techniques for establishing static bounds on the dynamic behav...
Andrew Cirillo, James Riely